TRACK A | VENDOR TRACK |
8:30 Forum: Security and the National Telecommunications Infrastructure
Moderator: Dick Brackney, National Security Agency Speakers: Teresa Lunt, DARPA; John Kimmins, Bellcore; and Bob McKosky, GTE Labs | 8:30 Internet/Intranet
Session Chair: Don Busson, Booz, Allen and Hamilton, Inc. Overview of the Microsoft Internet Security Framework, Curt Kolcun, Microsoft Federal Certification Authority Business, Tom Carty, GTE Strategies for Securing Your Corporate Intranet, Stuart Moore, Booz, Allen and Hamiliton, Inc. |
10:00 BREAK | 10:00 BREAK |
10:30 Security Architecture
Chair: Emilie Siarkiewicz, Rome Laboratory Using FORTEZZA for Transparent File Encryption Jeremy Epstein, Cordant; Tim Williams, General Kinetics An Extended Capabilities Architecture to Enforce Dynamic Access Control Policies I-Lung Kao, IBM; Randy Chow, University of Florida Sigma: Security for Distributed Object Interoperability between Trusted and Untrusted Systems John Sebes and Terry Vickers-Benzel, Trusted Information Systems | 10:30 Secure Wireless Technologies
Session Chair: Steve Noga, National Security Agency Firewalls Technology, Pete Sell, National Security Agency Biometrics/Voice Authentication Login, Scott Reider, NSA Internet Security Association Key Management Protocol, Pete Sell, NSA |
12:00 LUNCH | 12:00 LUNCH |
1:30 Firewalls
Chair: Jeremy Epstein, Cordant Operation Chain Link Julie Connolly, The MITRE Corporation Mandatory Protection for Internet Server Software Richard Smith, Secure Computing Corporation Using a Proxy X Server to Facilitate COTS Application Integration Eric Kaydan, The MITRE Corporation | 1:30 Web Technologies
Session Chair: Art Friedman, The MITRE Corporation Using TMACH as an MLS Web Server, Ganesh Murugesan, TIS Using Webstalker to Monitor Web Sites, Steve Smaha, Haystack Labs Oracle Security Products, Tim Ehrsam, Oracle |
3:00 BREAK | 3:00 BREAK |
3:30 Data Base Security
Chair: LouAnna Notargiacomo, Oracle Corporation A Comparison of Multilevel Structured Query language (SQL) Implementations Rae Burns, AGCS; Yi-Fang Koh, Raytheon A Role-Based Secure Database Design Tool Luigi Giuri and Pietro Iglio, Fondazione Ugo Bordoni, Italy | |
6:00 Conference Dinner | 6:00 Conference Dinner |
The Conference Dinner will take place at the Hyatt Islandia. A
theme for the evening is currently in process that will coordinate
a delicious dinner along with entertainment suited for the evening.
During the evening, the Best Paper Award will be announced so
you don't want to miss this. The dinner is included in the conference
registration fee. Guest tickets can be ordered on the pre-registration
form for $45.00.
[ACSAC HOME PAGE] [
GENERAL INFORMATION] [
PROGRAM OVERVIEW]
[
TECHNICAL PROGRAM] [
TUTORIALS] [
REGISTRATION/LOGISTICS] [MAIL ACSAC WEBMASTER]